ID

VAR-200212-0089


CVE

CVE-2002-2140


TITLE

Cisco PIX Firewall In HTTP Authentication buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2002-000285

DESCRIPTION

Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS. Cisco has reported a vulnerability in its PIX Firewall devices. A buffer overrun condition exists in the HTTP RADIUS/TACACS+ proxy component. The condition occurs when the PIX device processes a specially malformed request. Further technical details are not known at this time. Exploitation of this vulnerability may lead to code executed on target devices. It may also be possible to cause a denial of service, resulting in a network outage until the device is reset. Cisco PIX firewall provides enterprise-level security services, including state inspection firewall, IPSEC, VPN, intrusion detection and other functions. The HTTP RADIUS/TACACS+ proxy component of the Cisco PIX firewall does not correctly process user malformed requests. Remote attackers can exploit this vulnerability to carry out buffer overflow attacks and cause the device to restart. Users who initiate a connection via FTP, TELNET, or HTTP will be prompted to enter their username and password. If the username and password are verified by the specified TACACS+ or RADIUS authentication server, the PIX firewall will allow the \"cut-through proxy\" function of the firewall More communication takes place between the authentication server and the connection side. CISCO designated this vulnerability BUG ID as: CSCdx35823

Trust: 1.98

sources: NVD: CVE-2002-2140 // JVNDB: JVNDB-2002-000285 // BID: 6212 // VULHUB: VHN-6523

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 1.7

vendor:ciscomodel:pix firewallscope:eqversion:5.2

Trust: 1.7

vendor:ciscomodel:pix firewallscope:eqversion:6.2

Trust: 1.1

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 1.1

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(8\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(6\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(7\)

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(7\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(3\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(8\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(6\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(1\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(2\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(5\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5.2\(4\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(3.210)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1(4.206)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.0

Trust: 0.3

sources: BID: 6212 // JVNDB: JVNDB-2002-000285 // CNNVD: CNNVD-200212-684 // NVD: CVE-2002-2140

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-2140
value: MEDIUM

Trust: 1.0

NVD: CVE-2002-2140
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200212-684
value: MEDIUM

Trust: 0.6

VULHUB: VHN-6523
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-2140
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-6523
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-6523 // JVNDB: JVNDB-2002-000285 // CNNVD: CNNVD-200212-684 // NVD: CVE-2002-2140

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-2140

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200212-684

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 6212 // CNNVD: CNNVD-200212-684

CONFIGURATIONS

sources: JVNDB: JVNDB-2002-000285

PATCH

title:pix-multiple-vuln-puburl:http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml

Trust: 0.8

title:pix-multiple-vuln-puburl:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/pix-multiple-vuln-pub-j.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2002-000285

EXTERNAL IDS

db:NVDid:CVE-2002-2140

Trust: 2.5

db:BIDid:6212

Trust: 2.0

db:JVNDBid:JVNDB-2002-000285

Trust: 0.8

db:CNNVDid:CNNVD-200212-684

Trust: 0.7

db:CIACid:N-017

Trust: 0.6

db:CISCOid:20021120 CISCO PIX MULTIPLE VULNERABILITIES

Trust: 0.6

db:NSFOCUSid:3871

Trust: 0.6

db:XFid:10661

Trust: 0.6

db:VULHUBid:VHN-6523

Trust: 0.1

sources: VULHUB: VHN-6523 // BID: 6212 // JVNDB: JVNDB-2002-000285 // CNNVD: CNNVD-200212-684 // NVD: CVE-2002-2140

REFERENCES

url:http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml

Trust: 2.0

url:http://www.securityfocus.com/bid/6212

Trust: 1.7

url:http://www.ciac.org/ciac/bulletins/n-017.shtml

Trust: 1.7

url:http://www.iss.net/security_center/static/10661.php

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-2140

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-2140

Trust: 0.8

url:http://www.nsfocus.net/vulndb/3871

Trust: 0.6

sources: VULHUB: VHN-6523 // BID: 6212 // JVNDB: JVNDB-2002-000285 // CNNVD: CNNVD-200212-684 // NVD: CVE-2002-2140

CREDITS

Cisco PSIRT※ psirt@cisco.com

Trust: 0.6

sources: CNNVD: CNNVD-200212-684

SOURCES

db:VULHUBid:VHN-6523
db:BIDid:6212
db:JVNDBid:JVNDB-2002-000285
db:CNNVDid:CNNVD-200212-684
db:NVDid:CVE-2002-2140

LAST UPDATE DATE

2024-08-14T14:29:35.887000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-6523date:2018-10-30T00:00:00
db:BIDid:6212date:2002-11-20T00:00:00
db:JVNDBid:JVNDB-2002-000285date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-684date:2006-01-27T00:00:00
db:NVDid:CVE-2002-2140date:2018-10-30T16:26:18.060

SOURCES RELEASE DATE

db:VULHUBid:VHN-6523date:2002-12-31T00:00:00
db:BIDid:6212date:2002-11-20T00:00:00
db:JVNDBid:JVNDB-2002-000285date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-684date:2002-11-20T00:00:00
db:NVDid:CVE-2002-2140date:2002-12-31T05:00:00